Malware Reverse Engineer

Olivia is a software developer who has been with her company for 6 years. Through a company program, she has elected to complete cybersecurity training and is transitioning to a Reverse Engineering role.

From Software Developer to Malware Reverse Engineer

Olivia was identified in a company-wide challenge organized by the SOC manager to find those with both a technical background and a puzzle-solving mentality that could be applied in security investigations. She is experienced in both procedural and object-oriented programming with languages such as C, C++, Java, and Python. She has been set an initial 12-month goal to become a malware reverse engineer, and then a further goal to specialize in kernel-level analysis of either Windows or Linux systems.

Suggested Learning Track

The following is the suggested learning program for professionals looking to transition into a Malware Reverse Engineering role.

Behavioral Malware Analysis

Using system monitoring tools and analytic software, students will analyze real-world malware samples in a training environment, building secure labs, classifying malware, analyzing behavior, and documenting findings.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 College Credit

Endpoint Live Forensics

During this training, students learn how to identify abnormal activity and investigate a running Windows or Linux system that may have been compromised.

Learn More
01 5-Day Course
02 20 Lab Exercises
03 CPE/CEU Credit

Assembly for Reverse Engineers

Designed for malware analysts and code developers alike, this course will equip you to effectively read assembly, review statements, and reverse machine code back to its higher-level equivalent. 

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 CPE/CEU Credit

Malware Reverse Engineering

Malware Reverse Engineering builds on the knowledge and skills of our Assembly for Reverse Engineers course and teaches students how to perform more advanced analysis of real-world malware samples. 

Learn More
01 5-Day Course
02 20+ Lab Exercises
03 CPE/CEU Credit

Different from the Rest

At Focal Point, we are passionate about building stronger cybersecurity teams.

Flexible Delivery

Focal Point offers multiple training delivery methods - classroom, onsite, and online. Based on your needs, you can use one of our training facilities, go online, or we can bring our team to you.

70% Hands-On

We believe in the power of doing. Lectures are limited, and students spend most of their time building and testing real-world skills in our lab environments.

Top Instructors

Leverage the same world-class training used by cyber experts in the military and Fortune 500. Our instructors receive an average 4.9/5 rating for knowledge and delivery year after year.

Featured Learning Tracks

See where cyber workforce development can take your team.
SOC Analyst I
Learning Track

Cyber Threat Analyst I

Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.
Learn More
Cyber Skills Development 4
Learning Track

Malware Triage Analyst

Alex is an incident responder. After a year in this role, she is looking to further specialize her skillset. Her manager is giving Alex the opportunity to move into a malware triage role.
Learn More
App Developer
Learning Track

App Developer

Chris is a junior-level web developer who wants learn new coding languages, so he can expand his skillset to include application development.
Learn More